What is IBM Security Verify Identity?
The modernized, modular IBM Security Verify solution provides deep, AI-powered context for both consumer and workforce identity and access management (IAM). Protect your users and apps, inside and outside the enterprise, with a low-friction, cloud-native, software-as-a-service (SaaS) approach that leverages the cloud. For legacy, on-premises apps, the Verify Access version provides a smooth path to cloud, so you can transition at your own pace.
Company Details
Need Assistance?
We're here to help you with understanding our reports and the data inside to help you make decisions.
Get AssistanceIBM Security Verify Identity Ratings
Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard
to access more information on IBM Security Verify Identity.
78 Likeliness to Recommend
95 Plan to Renew
72 Satisfaction of Cost Relative to Value
Emotional Footprint Overview
+84 Net Emotional Footprint
The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.
How much do users love IBM Security Verify Identity?
Pros
- Acts with Integrity
- Reliable
- Client Friendly Policies
- Altruistic
How to read the Emotional Footprint
The Net Emotional Footprint measures high-level user sentiment towards particular product offerings. It aggregates emotional response ratings for various dimensions of the vendor-client relationship and product effectiveness, creating a powerful indicator of overall user feeling toward the vendor and product.
While purchasing decisions shouldn't be based on emotion, it's valuable to know what kind of emotional response the vendor you're considering elicits from their users.
Footprint
Negative
Neutral
Positive
Feature Ratings
Mobility Support
Provisioning Deprovisioning
Activity Monitoring Alerts
Web Cloud Single Sign on (SSO)
Reporting
Multi-Factor Authentication (MFA)
Access Request Management
Password Management
Identity Governance
Privileged Access Management
Advanced Provisioning
Vendor Capability Ratings
Ease of Customization
Ease of Data Integration
Quality of Features
Usability and Intuitiveness
Ease of IT Administration
Breadth of Features
Ease of Implementation
Vendor Support
Business Value Created
Product Strategy and Rate of Improvement
Availability and Quality of Training
IBM Security Verify Identity Reviews
Nakul S.
- Role: Information Technology
- Industry: Banking
- Involvement: IT Development, Integration, and Administration
Submitted May 2024
Easy to use as IDM tool
Likeliness to Recommend
What differentiates IBM Security Verify Identity from other similar products?
Scalability
What is your favorite aspect of this product?
Easy to use
What do you dislike most about this product?
Process are too lengthy
What recommendations would you give to someone considering this product?
Move to cloud for better explore
Pros
- Helps Innovate
- Reliable
- Performance Enhancing
- Trustworthy
Please tell us why you think this review should be flagged.
Yurie Katri P.
- Role: Information Technology
- Industry: Telecommunications
- Involvement: End User of Application
Submitted Feb 2023
The security is more important than ever
Likeliness to Recommend
What differentiates IBM Security Verify Identity from other similar products?
Strong authentication is the process of using a combination of things like passwords, pins, and fingerprints to verify who you are. You can sell services in the form of subscriptions to help your clients stay safe on the go. IBM Security Identity Manager is a powerful multifactor authentication solution that provides unprecedented simplicity for users and administrators. It provides a simple interface, centralized policy, and a single access point to integrate your web, mobile, IoT, and cloud applications. You can quickly deliver strong authentication with enterprise-grade security with IBM Security Identity Manager.
What is your favorite aspect of this product?
Strong authentication is one of the many features it offers. However, to access certain sensitive or risky parts of your account, a user must enter a one-time password generated by the mobile app or email verification, which makes our product secure and user-friendly. Mobile security is a complex issue. It would help if you balanced convenience, security, and reliability. It's a secure multi-factor authentication solution that lets you establish a risk-based decision process for granting or denying mobile requests automatically. The best way to manage your mobile risk is by verifying who they are and where they're from.
What recommendations would you give to someone considering this product?
The multi-factor authentication service allows you to adjust permissions based on risk factors in your application, such as data, location, and IP reputation. Adopt risk-based access controls to secure your enterprise better. Utilize the Verify Access risk scoring engine to reduce the likelihood of a cyber breach with context-aware authorization. Automated risk-based access controls.
Pros
- Helps Innovate
- Continually Improving Product
- Reliable
- Performance Enhancing
Please tell us why you think this review should be flagged.
Leonardo M.
- Role: Information Technology
- Industry: Entertainment
- Involvement: IT Leader or Manager
Submitted Nov 2022
IBM a very adjustable solution to your organizatio
Likeliness to Recommend
What differentiates IBM Security Verify Identity from other similar products?
Unlike other tools, we think that it has no comparison since its level of protection is of a very good quality for us and our entire organization.
What is your favorite aspect of this product?
IBM Security Verify works very well with large enterprises, which is critical to protecting internal and external customer information. In addition, we can also say that what we like the most about this tool is that the multi-factor authentication is reliable, and also the QR code login is a step forward in the market.
What do you dislike most about this product?
In my very particular opinion I can say that I have not found any fault with this tool since for us it is very good to maintain the security of our equipment in a very effective and safe way, in addition to the integration with other IBM software It is excellent and enhances capabilities.
What recommendations would you give to someone considering this product?
In our opinion, this tool has helped us a lot as it is quite good because it has reverse proxy functionalities. product performance. easy to customize to meet business needs. Quality and availability of support teams. Therefore, we can always recommend this tool to any partner, or whoever asks us, as we have had great help with this tool, which makes all the work in the organization much easier.
Pros
- Reliable
- Efficient Service
- Effective Service
- Caring
Please tell us why you think this review should be flagged.
Get Instant Access<br>to this Report
Get Instant Access
to this Report
Unlock your first report with just a business email. Register to access our entire library.
© 2024 SoftwareReviews.com. All rights reserved.